Abstract
It is important to ensure the private key secure in cryptosystem. To reduce the underlying danger caused by the private key leakage, Dodis et al. (2003) introduced the notion of key-insulated security. To handle the private key leakage problems in certificateless signature schemes, we propose a new certificateless strong key-insulated signature scheme. Our scheme has two desirable properties. First, its security can be proved without utilizing the random oracle model. Second, it solves the key escrow problems in identity-based key-insulated signatures (IBKISs).
Similar content being viewed by others
References
Shamir A. Identity-based cryptosystems and signature schemes [C]// Advances in Cryptology-Crypto 1984. Berlin: Springer-Verlag, 1984: 47–53.
Al-Riyami S S, Paterson K G. Certificateless public key cryptography [C] // Proceedings of 9th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology-Asiacrypt 2003. Berlin: Springer-Verlag, 2003: 452–473.
Dodis Y, Katz J, Xu S, et al. Key-insulated publickey cryptosystems [C]// Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology-Eurocrypt’2002. Berlin: Springer-Verlag, 2002: 65–82.
Dodis Y, Katz J, Xu S, et al. Strong key-insulated signature schemes [C]// Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography. Berlin: Springer-Verlag, 2003: 130–144.
Dodis Y, Yung M. Exposure-resilience for free: The hierarchical ID-based encryption case [C]// Proceedings of the First International IEEE Security in Storage Workshop. Washington, DC, USA: IEEE, 2002: 45–52.
Hanaoka G, Hanaoka Y, Imai H. Parallel keyinsulated public key encryption [C]// Proceedings of the 9th International Conference on Practice and Theory in Public Key Cryptograph: Public Key Cryptography. Berlin: Springer-Verlag, 2006: 105–122.
Hanaoka Y, Hanaoka G, Shikata J, et al. Unconditionally secure key-insulated cryptosystems: models, bounds and constructions [C]// Proceedings of the 4th International Conference on Information and Communications Security. Berlin: Springer-Verlag, 2002: 85–96.
Le Z, Ouyang Y, Ford J, et al. A hierarchical key-insulated signature scheme in the CA trust model[C]// Proceedings of 7th International Conference on Information Security. Berlin: Springer-Verlag, 2004: 280–291.
Weng J, Chen K F, Liu S L, et al. Identity-based key-insulated signature with secure key-updates [C]// Proceedings of the 6th China International Conference on Information Security and Cryptology. Berlin: Springer-Verlag, 2006: 13–26.
Weng J, Chen K F, Liu S L, et al. Identity-based strong key-insulated signature without random oracles [J]. Jounal of Software, 2008, 19(6): 1555–1564.
Zhou Y, Cao Z F, Chai Z C. Identity-based key insulated signature [C]// Proceedings of Second International Conference on Information Security Practice and Experience. Berlin: Springer-Verlag, 2006: 226–234.
Bellare M, Palacio A. Protecting against key exposure: strongly key-insulated encryption with optimal threshold [J]. Applicable Algebra in Engineering, Communication and Computing, 2006, 16(6): 379–396.
Canetti R, Goldreich O, Halevi S. The random oracle methodology, revisited [J]. Journal of the ACM, 2004, 51(4): 557–594.
Xiong H, Qin Z, Li F. An improved certificateless signature scheme secure in the standard model [J]. Fundamenta Informaticae, 2008, 88(1): 1–14.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: the National Natural Science Foundation of China (Nos. 61003215, 61005049, 60903178 and 61103183), the Fundamental Research Funds for the Central Universities (No. 2010B09614) and the Foundation of HoHai University (No. 2084/409265)
Rights and permissions
About this article
Cite this article
Wan, Zm., Meng, Xq. & Hong, X. Certificateless strong key-insulated signature without random oracles. J. Shanghai Jiaotong Univ. (Sci.) 16, 571–576 (2011). https://doi.org/10.1007/s12204-011-1191-7
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12204-011-1191-7